By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

This firewall security best practices guide, which is a compilation of resources from SearchSecurity.com on firewall network security, offers helpful resources for network security novices as well as veteran security analysts and managers. It explains how firewalls work, offers firewall deployment best practices, details how to troubleshoot, test and configure firewalls, and more.

Firewall network security: Thwarting sophisticated attacksIn this expert response from Mike Chapple, gain a better understating of the importance of a firewall to an enterprise’s security strategy, and learn how a firewall boosts network security by protecting a network from sophisticated attacks, as well as the technology’s limitations.

Here, network security expert Anand Sastry explains how enterprise how a defense-in-depth strategy built on firewalls and other critical network infrastructure can augment enterprise network security, and reviews a practical defense-in-depth deployment scenario that uses existing technologies, including firewalls, to form a comprehensive and effective enterprise network security architecture.

More information on firewall security best practices

This introduction to firewalls defines the network security technology explaining each type and what they protect to keep enterprise data secure, from UTM to proxys.

As IPv6 gets rolled out on enterprise WANs, so will IPv6 firewalls, and IT should be aware of IPv6 security loopholes to adequately protect their corporate WANs.

In this article, security expert Anand Sastry discusses alterative firewall deployments, and firewall deployment best practices every enterprise should be aware of in order to guard against new and emerging security threats.

Continuous monitoring strategy for government security managers Government security managers working with a compliance-based security model are constantly playing catch-up, scrambling to comply with the latest security mandates or standards handed down from above, making a move from a compliance-based security model to an continuous security model an option worth considering.

Here, contributor Richard Walker offers insights and advice for government security managers on the benefits of continuous monitoring, as well as how to successfully implement a continuous monitoring strategy.

How to properly implement firewall egress filteringDeploying firewall egress filtering, while easy to do, can unintentionally break certain applications and services by denying outbound traffic to the Internet, an aftereffect that causes many enterprises to skip the process altogether for fear of disrupting mission-critical network traffic.

In this article, contributor Scott Floyd explains the proper way to implement firewall egress filtering and block outbound network traffic, including how to use the log analysis tool Splunk to monitor firewall configurations.

According to security expert Joel Dubin, there are three essential steps when testing firewalls in the enterprise. Here, he outlines those steps and explains how to test a firewall, covering subjective evaluation, efficacy of threat mitigation and performance testing.

Application security expert Michael Cobb examines the next-generation firewall, outlining the features and capabilities of the technology, and comparing them to more traditional firewall options on the market today.

In this expert response, Mike Chapple discusses the capabilities of both UTM and next-gen firewall devices, and offers advice on which is the best option for enterprise Web 2.0 security threat protection.

E-Handbook

0 comments

E-Mail

Username / Password

Password

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy